Check Imaging Software Reports

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016

TechTarget ComputerWeekly.com

The Future of Financial Services: Part 1
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.
Posted: 08 Feb 2021 | Published: 17 Oct 2018

TechTarget ComputerWeekly.com

The Future of Financial Services: Part 2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 08 Feb 2021 | Published: 11 Feb 2019

TechTarget ComputerWeekly.com

The need for data automation in Hyperion Financial Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Hyperion Financial Management (HFM) is a core tool for many organisations in dealing with their financial planning, consolidations and reporting. Although it has its strengths, its weaknesses can open organisations up to major problems, say Quocirca analysts Clive Longbottom and Rob Bamford.
Posted: 08 Feb 2021 | Published: 19 Jan 2017

TechTarget ComputerWeekly.com

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com

Top 10 IT in the Nordics stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Nordic region punches above its weight in IT terms, with a rich tech ecosystem that ranges from clusters of tech startups creating the latest apps to large in-house IT teams transforming traditional industries. Here are Computer Weekly's top 10 Nordic enterprise IT stories of 2019.
Posted: 08 Feb 2021 | Published: 23 Dec 2019

TechTarget ComputerWeekly.com

Using IT initiatives to save money and reinforce green credentials
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.
Posted: 08 Feb 2021 | Published: 05 Jan 2017

TechTarget ComputerWeekly.com

Virtual currencies and their potential role in cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

Ten Steps to Better Requirements Management
sponsored by IBM
WHITE PAPER: Requirements definition and management is an activity that has the potential to deliver a high, fast ROI. This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management. Read on to learn how better requirements translate into easier, higher quality projects.
Posted: 02 Apr 2009 | Published: 01 Oct 2008

IBM

Testing Embedded Systems: Do You Have the GuTs for It?
sponsored by IBM Software Group
NEWSLETTER: This article is a general introduction to the testing of embedded systems, and will be followed over the course of the year by more articles focusing on some of the topics discussed.
Posted: 14 Mar 2008 | Published: 24 Nov 2003

IBM Software Group

The Complete Network Assessment
sponsored by Dorado Software
WHITE PAPER: This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Dorado Software

The Match Game: Is Offshoring a Fit for Your Help Desk Outsourcing Strategy?
sponsored by ABS Associates, Inc.
WHITE PAPER: Let's examine the pros and cons of each as well as different situations where one or the other is the ideal match for your service desk strategy.
Posted: 13 Feb 2008 | Published: 13 Feb 2008

ABS Associates, Inc.

The Role of Integrated Requirements Management in Software Delivery
sponsored by IBM
WHITE PAPER: This paper is about the critical role that integrated requirements management can play in helping to ensure that your business goals and IT investment are continuously aligned.
Posted: 24 May 2010 | Published: 01 Oct 2007

IBM

The Social Enterprise: Using Social Enterprise Applications to Enable the Next Wave of Knowledge Worker Productivity
sponsored by Oracle Corporation
WHITE PAPER: Enterprise social applications are the next generation of collaboration and productivity tools, capturing the interpersonal knowledge of workers and the implicit connections among people, systems, and data.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation

The Supply Chains Innovator's Technology Footprint
sponsored by Infor
WHITE PAPER: Pressure is increasing to better manage supply chains to improve customer service, lower product costs and increase business process efficiency. Read this paper to learn about best practices for improving an organization's supply chain proces...
Posted: 10 Nov 2006 | Published: 01 May 2006

Infor

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

TMA Resources Increases Customer Satisfaction Rates by Four Times with Parature Customer Service™ Software
sponsored by Parature, Inc.
CASE STUDY: In this case study, TMA needed to streamline and automate its manual customer service process to reduce resolution times and improve satisfaction. Learn how Parature Customer Service software reduced time on manual administrative activities by 25%.
Posted: 28 Aug 2008 | Published: 28 Aug 2008

Parature, Inc.

Top 10 Reasons You Need EMC MozyEnterprise
sponsored by EMC Corporation
PRODUCT LITERATURE: This document provides the top 10 reasons to choose EMC MozyEnterprise.
Posted: 07 Mar 2008 | Published: 01 Feb 2008

EMC Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Total Economic Impact of Oracle Enterprise Manager Database Management Packs
sponsored by Oracle Corporation
WHITE PAPER: This study highlights the benefits and costs of deploying the Oracle Enterprise Manager Diagnostic Pack and Tuning Pack across the enterprise of a sample organization. The study examines the estimated ROI for the sample organization and presents aggregate findings derived from the interview and analysis process and Forrester's independent research.
Posted: 18 Mar 2009 | Published: 18 Feb 2008

Oracle Corporation

Two Billion Entry Directory Benchmark
sponsored by Oracle Corporation
WHITE PAPER: This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Posted: 10 Apr 2008 | Published: 01 Mar 2008

Oracle Corporation

University of Georgia Gets Lesson: NetVault™ Makes the Grade in Power, Ease of Use
sponsored by BakBone
CASE STUDY: UGA evaluated several companies backup/restore software, before choosing BakBone Software NetVault. This case study examines why UGA opted for BakBone software.
Posted: 16 Apr 2008 | Published: 01 Nov 2001

BakBone

User Interface Development for Embedded Systems
sponsored by Mentor Graphics
TECHNICAL ARTICLE: An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls.
Posted: 10 Mar 2009 | Published: 13 Jan 2009

Mentor Graphics

VeriSign Mobile Enterprise Services: Enabling Next-Generation Mobile Messaging for Enterprises
sponsored by VeriSign, Inc
WHITE PAPER: This Solution Paper provides an overview of the rapidly growing mobile messaging and alerts market, and introduces a solution that addresses that market: VeriSign Mobile Messaging, an offering of VeriSign Mobile Enterprise Services (VMES).
Posted: 05 Jun 2009 | Published: 02 Dec 2008

VeriSign, Inc

Vestcom International: Personalization Drives Repeat Business
sponsored by Exstream Software
CASE STUDY: Vestcom International is a New Jersey-based firm that offers end-to-end personalized communication solutions. Vestcom used Exstream Software's Dialogue solution to design a sophisticated relationship management program that is fostering...
Posted: 24 Apr 2008 | Published: 01 Jan 2004

Exstream Software